[原文]Cerulean Trillian 220.127.116.11 allows remote attackers to cause a denial of service (client crash) via an AIM message containing the Mac encoded Rich Text Format (RTF) escape sequences (1) \'d1, (2) \'d2, (3) \'d3, (4) \'d4, and (5) \'d5. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Trillian contains a flaw that may allow a remote denial of service. The issue is triggered when an AIM message is received with certain Mac encoded RTF character codes. The codes are: \'d1 \'d2 \'d3 \'d4 \'d5, and can be accidentally sent by by copying text from an OSX application and pasting it to the victim. The victim's client will close immediately upon receiving such characters.
Upgrade to version 18.104.22.168 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.